An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley.

Slides:



Advertisements
Similar presentations
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong Group for User Interface Research Computer Science Division University of California.
Advertisements

An Architecture for Privacy-Sensitive Ubiquitous Computing 1 Cindy Nguyen An Architecture for Privacy-Sensitive Ubiquitous Computing By: Cindy Nguyen University.
Usable Security – CS 6204 – Fall, 2009 – Dennis Kafura – Virginia Tech Privacy and Trust Frameworks/Systems Presented by Zalia Shams Usable Security –
Greg Lamb. Introduction It is clear that we as consumers and entrepreneurs cannot expect complete privacy when discussing business matters. However… There.
VoipNow Core Solution capabilities and business value.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
Social Media: FACEBOOK Kristin Martin Professional Development.
Lecture 2 Page 1 CS 236, Spring 2008 Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher Spring, 2008.
1 A study on Location Aware Computing Presenter : Narendiran Visvanathan Instructor : Dr. Chin-Chih Chang Course : CS 898T Mobile and Wireless Networks.
02/12/00 E-Business Architecture
Privacy Risk Models for Designing Privacy-Sensitive Ubiquitous Computing Systems Jason Hong Carnegie Mellon Jennifer Ng Carnegie Mellon Scott Lederer University.
1 System Needs for Fast Location Aware Application Development Spatial Group Meeting 4/1/2004 shashi-group/
An Application-led Approach for Security-related Research in Ubicomp Philip Robinson TecO, Karlsruhe University 11 May 2005.
Privacy and Ubiquitous Computing Jason I. Hong. Ubicomp Privacy is a Serious Concern “[Active Badge] could tell when you were in the bathroom, when you.
Security Management IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
CS 239: Advanced Security Spring 04 Security in Pervasive and Ubiquitous Environments Sam Irvine
Privacy and Security in the Location-enhanced World Wide Web UC Berkeley Intel / UW UW Intel UC Berkeley Jason Hong Gaetano Boriello James Landay David.
User studies. Why user studies? How do we know security and privacy solutions are really usable? Have to observe users! –you may be surprised by what.
© 2004, The Trustees of Indiana University 1 OneStart Workflow Basics Brian McGough, Manager, Systems Integration, UITS Ryan Kirkendall, Lead Developer.
Privacy and Networks CPS 96 Eduardo Cuervo Amre Shakimov.
An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong HCI Institute Carnegie Mellon University James A. Landay Computer Science and.
Security Management IACT 418/918 Autumn 2005 Gene Awyzio SITACS University of Wollongong.
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
Location Privacy Christopher Pride. Readings Location Disclosure to Social Relations: Why, When, and What People Want to Share Location Disclosure to.
WebQuilt and Mobile Devices: A Web Usability Testing and Analysis Tool for the Mobile Internet Tara Matthews Seattle University April 5, 2001 Faculty Mentor:
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
Elite Networking & Consulting Presents: Everything You Wanted To Know About Data Insurance* * But Were Afraid To Ask Elite Networking & Consulting, LLC,
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Lecture 18 Page 1 CS 111 Online Design Principles for Secure Systems Economy Complete mediation Open design Separation of privileges Least privilege Least.
ESCCO Data Security Training David Dixon September 2014.
PRIVACY BOOTCAMP YpJU.
MS Tech-Ed 2006 Iron Architect Competition Greg Cogdell Milliken & Co.
MIS 385/MBA 664 Systems Implementation with DBMS/ Database Management Dave Salisbury ( )
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
Intro to Context-Aware Computing Jason I. Hong. Context-Aware Computing Shift from explicit to implicit interaction Use this implicit input to adapt systems.
File Upload Competitive Analysis. Catalyst - Browse in-line Of interest:
1 / 14 FIDIS 2 nd WS WP2 – Fontainebleau, December 2004 Identity in the Ambient Intelligence Environment Sabine Delaitre.
Ryan Lackey Dynamic Locations: Secure Mobile Services Discovery and Dynamic Group Membership Ryan Lackey
Understanding Networking Joe Cicero Northeast Wisconsin Technical College.
PRIVACY, SECURITY & ID THEFT PREVENTION - TIPS FOR THE VIGILANT BUSINESS - SMALL BUSINESS & ECONOMIC DEVELOPMENT FORUM October 21, WITH THANKS TO.
By: Emma Barnett CELL PHONE GPS: SAFETY OR STALKING DEVICES?
SharePoint document libraries I: Introduction to sharing files Sharjah Higher Colleges of Technology presents:
PERVASIVE COMPUTING MIDDLEWARE BY SCHIELE, HANDTE, AND BECKER A Presentation by Nancy Shah.
D1 - 25/10/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
ACOMP 2011 A Novel Framework for LBS Privacy Preservation in Dynamic Context Environment.
Privacy Engineering for Digital Rights Management Systems By XiaoYu Chen.
Tools for Web Design and for Ubiquitous Computing Jason I. Hong Computer Science Division University of California, Berkeley.
An Architecture for Privacy-Sensitive Ubiquitous Computing By Jason I-An Hong In MobiSYS ’04: Proceedings of the 2nd international conference on mobile.
Virtual Workspaces Kate Keahey Argonne National Laboratory.
Mobile and Location-Based Services Jason I. Hong Product Design and Usability April
Intro to Ubicomp Privacy Jason I. Hong. Ubicomp envisions –lots of sensors for gathering data –rich world models describing people, places, things –pervasive.
Lecture 20 Page 1 Advanced Network Security Basic Approaches to DDoS Defense Advanced Network Security Peter Reiher August, 2014.
Approximate Information Flows: Socially-based Modeling of Privacy in Ubiquitous Computing Xiaodong Jiang Jason I. Hong James A. Landay G r o u p f o r.
In Search of Usable Security: Five Lessons from the Field Presentation by 王志誠.
Security Vulnerabilities in A Virtual Environment
PRIVACY BOOTCAMP Jack Vale - Social Media Experiement.
McGraw-Hill/Irwin © 2008 The McGraw-Hill Companies, All Rights Reserved Chapter 7 Storing Organizational Information - Databases.
Chapter 6 Discovering the Scope of the Incident Spring Incident Response & Computer Forensics.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
A Study of Context-Awareness: The Context Fusion Network, The Context Fabric Presented by Sangkeun Lee IDS Lab., Seoul National University Solar:
Privacy in the Age of Ubiquitous Computing Jason I. Hong Scott Lederer Jennifer Ng Anind K. Dey James A. Landay G r o u p f o r User Interface Research.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Business Challenges in the evolution of HOME AUTOMATION (IoT)
The Context Fabric: An Infrastructure for Context-Aware Computing Jason I. Hong Group for User Interface Research, Computer Science Division University.
Prof. James A. Landay University of Washington Spring 2008 Web Interface Design, Prototyping, and Implementation Ubicomp Design Pre-Patterns May 29, 2008.
Visibook is instant, simple, and dynamic appointment booking We're headquartered in San Francisco, California "Visibook is awesome. My entire studio was.
File Stream and Team Drives
Model-View-Controller Patterns and Frameworks
COMPLETE BUSINESS TEXTING SOLUTION
Report from the trenches of an HTML5 game provider
Presentation transcript:

An Architecture for Privacy-Sensitive Ubiquitous Computing Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley

Mar The Origins of Ubiquitous Computing What’s wrong with Personal Computers? –Too complex and hard to use –Too demanding of attention –Too isolating from other people –Too dominating of our desktops and our lives Ubiquitous Computing Project at Xerox PARC –Advances in wireless networking, sensors, devices –Observations of how people use tools in practice –Make computers a natural part of everyday interactions

Mar The Origins of Ubiquitous Computing

Mar Emerging Examples of Ubicomp Never Get Lost Find Friends Emergency Response

Mar “But What About My Privacy?” Never Get Lost –You walk past a restaurant and your cellphone rings with the specials of the day Find Friends –“Family is already very close to you, so if they’re checking up on you…sort of already smothering and this is one step further.” –“[It] could tell when you were in the bathroom, when you left the unit, and how long and where you ate your lunch. EXACTLY what you are afraid of.” Emergency Response –“I don’t see how a government or an organization will not come up with an excuse to use [location info] for another purpose.” Flood of Location-Based Spam Never Hide From Friends and Co-Workers Constant Surveillance

Mar Our Research in Ubicomp Privacy Fundamental Tension –Ubiquitous Computing can be used for great benefit –Ubiquitous Computing can be used for great harm –Privacy may be greatest barrier to long-term success Why hasn’t this been addressed yet? –Privacy an issue since inception, but little has been done –Has to address many issues simultaneously Social and Organizational, Interaction Design, Technical My approach –What are the privacy concerns in ubicomp? –What is good interaction design for privacy? –What are better ways of building privacy-sensitive apps?

Mar What is Privacy? Lots of perspectives on privacy –US Constitution, UN Decl. Human Rights, Hippocratic Oath –Influenced by Legal, Market, Social, and Technical forces Privacy is not just Orwell –From “Big Brother” to “Little Sisters” –Media sensationalization of worst-case scenarios Privacy is not just computer security –Adversaries? Friends, family, co-workers, acquaintances –Anonymity? Friends already know your identity –Secrecy? We share personal info with friends all the time –Damage? Risk may be undesired social obligations I am approaching privacy from an HCI perspective

Mar An HCI Perspective on Privacy “The problem, while often couched in terms of privacy, is really one of control. If the computational system is invisible as well as extensive, it becomes hard to know: – what is controlling what – what is connected to what – where information is flowing – how it is being used – what is broken (vs what is working correctly)” The Origins of Ubiquitous Computing Research at PARC in the Late 1980s Weiser, Gold, Brown Make it easy to share: the right information with the right people (or service) at the right time

Mar What are End-User Privacy Needs? Lots of speculation about privacy, little data out there Analyzed survey of 130 people on ubicomp privacy prefs Analyzed nurse message board on locator systems – Examined papers describing usage of ubicomp systems Examined existing and proposed privacy protection laws –EU Directive, Location Privacy Act 2001, Wireless Privacy Act 2004 Interviewed 20 people on various location-based services –Did not mention the word “privacy” unless they did first

Mar End-User Privacy Needs Value proposition Simple and appropriate control and feedback Plausible deniability Limited retention of data Decentralized architectures Special exceptions for emergencies Alice’s Location Bob’s Location

Mar How to Design for Privacy? Given this design space, how to cover them well? Five Pitfalls in Designing for Privacy [PUC 2004]

Mar Obscuring Actual Flow Users should understand what information is being disclosed to whom Who is querying my location? How often? Requestor informed of disclosure Requestee sees each request

Mar Configuration over Action Designs should not require excessive configuration to manage privacy –“Right” configuration hard to predict in advance –Make privacy a natural part of the interaction flow

Mar Lacking Coarse-Grain Control Designs should not forego an obvious, top-level mechanism for halting and resuming disclosure “[T]raveling employees may want their bosses to be able to locate them during the day but not after 5 p.m. Others may want to receive coupons from coffee shops before 9 a.m. on weekdays but not on weekends when they sleep in. Some may want their friends alerted only when they are within one mile, but not 10 miles.” Protecting the Cellphone User's Right to Hide New York Times Feb Did I set it right? How do I know? Simple, leaves no doubt in user’s mind that it is doing what they think it is

Mar How to Build Applications Better? A toolkit providing UI and systems support, to simplify construction of privacy-sensitive ubicomp apps –Cover the end-user privacy needs –Embody good interaction design principles wrt privacy –Be useful for application developers Context Fabric –Architecture and suite of mechanisms for managing privacy –Prevent – Strong guarantees on your personal data –Avoid – Better user interfaces for managing privacy –Detect – Finding over-monitoring or accidental disclosures Will go over key architectural points

Mar Locality Keep personal data “close” to end-users –Move from centralized systems to decentralized ones –Capture, store, and process personal data on my computer PlaceLab ABC – Works indoors and in urban canyons – No special equipment – Privacy-sensitive – Rides the WiFi wave

Mar PlaceLab ~52000 Nodes (3Megs)

Mar PlaceLab ~500 Nodes

Mar Locality MiniGis Server for processing location locally Country Name= United States Region Name= California City Name= Berkeley ZIP Code= Place Name= Soda Hall Lat Lon= ,

Mar Locality MiniGis Server data sources USGS State Gazetteer –Names in USA –2m records ~650 megs –States, Cities, Places “Places” hardest to get –Airports & schools useful, “lava”, “quicksand”, “hammocks” less so –3 undergrads scouring Berkeley –Research opportunity in open, distributed naming of places GEOnet Names Server –Names outside USA –5.5m records ~700megs –Regions, Cities, Places

Mar InfoSpace Diary InfoSpace stores your personal information –Static info, like name and phone# –Dynamic info, like current location and activity Runs on your personal device or on a trusted service –Local sources (ex. PlaceLab) can update dynamic info –Can choose to expose different parts to different people & services

Mar Confab Architecture InfoSpace Diary InfoSpace Diary LocNamePlaceLabTourguideFind FriendMiniGis How to make users aware of and be able to control the flow of personal info? Request

Mar Observations on Disclosure Prefs Visibility and control without overwhelming end-users? Who is requesting information is most important factor –“Either I trust someone with my information or I don't.” –“I trust the person to know how to exercise discretion.” Time is an essential aspect for maintaining control –“Work people can know my information during work hours. Home/SO people can know my information always.” Can set prefs before, during, or after a request –During case easy to understand, but can overwhelm –After case easy to setup, but can lead to accidental disclosures

Mar Access Notifications People

Mar Access Notifications Services

Mar Access Notifications Initial Evaluations –Iterated with 7 people for understandability and reactions –Ex. Find friend, location-enhanced tourguide, emergency response Results –For most part, worked well (but still too much text) –Some distinctions in how often information is shared “Giving a GPS location once or twice does not provide enough information for an invasion of privacy… [but] if GPS location is shared every 2 seconds, there is a potential for an invasion of privacy.” “No need for continuous update of location. Only in a race or a marathon (where staying on track is essential) would continuous update be helpful.”

Mar Continuous Discrete Push Tourguide E911 PullFind Friend Users’ Conceptual Model Emergency Response I continuously share personal info with another person or service Others request personal information from me I send personal information to others

Mar Continuous Discrete Push ??? PullAccess Notifications Design Space PlaceBar

Mar Confab Architecture InfoSpace Diary InfoSpace Diary LocNamePlaceLab Tourguide Find Friend MiniGis How to control what happens to your info once it leaves your InfoSpace? Access Pull Push

Mar Privacy Tags Digital Rights Management for Privacy –Like adding note to , “Please don’t forward” –Notify address- –Time to live- 5 days –Max number of sightings- last 5 sightings of my location Libraries for making it easy for app developers Requires non-technical solutions for deployment –TrustE, Consumer Reports, Amazon ratings

Mar Architectural Analysis Prevent –Capture and process personal information locally –PlaceLab, MiniGis –Minimizes risk of mission creep (ex. SSNs) Avoid –Interfaces for feedback and control over personal information –Access Notifications / PlaceBar Detect –Finding problems –Access Notifications –Privacy Tags (processed on requestor’s side)

Mar Application Developer Support Want to make it easy for app developers too Extensibility through chainable operators Programming Support Debugging Operators Active Properties In Operators InfoSpace Diary InfoSpace Diary Out Operators On Operators Garbage Collect Coalesce Periodic Reports Invisible Enforce Access Check Privacy Tag

Mar Application Developer Support ConfabClient –Java client-side API for accessing InfoSpaces –add, remove, query Active Properties –Stores and can automatically update values localuser.location localuser.activity localuser.name OnDemandQuery PeriodicQuery Static Berkeley, CA Busy Jason

Mar Implementation Confab, PlaceLab, MiniGis –Java 1.5, Tomcat Web Server, MySql, Jaxen XPath Data –WiFi from wigle.net and undergrads –MiniGis from USGS, GeoNET, and undergrads –~35 megs of data (20 megs of place data) #Classes Lines of codeComments Confab PlaceLab MiniGis Shared Libs

Mar Putting it Together Lemming Location-enhanced Messenger

Mar Putting it Together Lemming Location-enhanced Messenger

Mar Putting it Together BEARS Emergency Response Server Field studies and interviews with firefighters [CHI2004] Finding victims in a building –“You bet we’d definitely want that.” –“It would help to know what floor they are on.” But emergencies are rare –How to balance privacy constraints with utility when needed?

Mar Putting it Together BEARS Emergency Response Server Trusted third party (MedicAlert++) Data Sharer Location Building BEARS Service Link 1 2 Trusted BEARS Third- Party Trusted BEARS Third- Party Location 3 4 Medic Alert++ Medic Alert++ Loc “ABC” On Emergency

Mar Requirements Check Value proposition Simple and appropriate control and feedback –Access Notifications (pull) and PlaceBar (push) Plausible deniability –No action, “Ignore for now”, and “Never Allow” appear same Limited retention of data –Privacy Tags, Automatic deletion of old data Decentralized architectures –PlaceLab and MiniGis Special exceptions for emergencies

Mar Conclusions Investigated ubicomp privacy from many perspectives –Analysis of end-user needs / interaction design issues Context Fabric architecture for privacy-sensitive ubicomp –Architecture and mechanisms for managing privacy Locality, InfoSpace Diary, Access Notifications, Privacy Tags Protection at physical, infrastructure, and application layers –Evaluation with two applications “Use technology correctly to enhance life. It is important that people have a choice in how much information can be disclosed. Then the technology is useful.”

Jason I. Hong G r o u p f o r User Interface Research University of California Berkeley Thanks to: DARPA Expeditions Intel Fellowship NSF ITR Siebel Systems Fellowship PARC Intel Research

Mar Backup Slides

Mar Five Pitfalls

Mar How to Design for Privacy? What are good privacy-sensitive user interfaces? –Knowing what is needed does not say how to do it well

Mar Five Pitfalls for Designers Understanding Obscuring potential information flow Obscuring actual information flow Action Configuration over action Lacking coarse-grained control Inhibiting established practices

Mar #1 – Obscuring Potential Flow Users can make informed use of a system only when they understand the scope of its privacy implications

Mar #2 – Obscuring Actual Flow Users should understand what information is being disclosed to whom Who is querying my location? How often? Requestor informed of disclosure Requestee sees each request

Mar #3 – Configuration Over Action Designs should not require excessive configuration to manage privacy –“Right” configuration hard to predict in advance –Make privacy a natural part of the interaction flow

Mar #4 – Lacking Coarse-Grain Control Designs should not forego an obvious, top-level mechanism for halting and resuming disclosure “[T]raveling employees may want their bosses to be able to locate them during the day but not after 5 p.m. Others may want to receive coupons from coffee shops before 9 a.m. on weekdays but not on weekends when they sleep in. Some may want their friends alerted only when they are within one mile, but not 10 miles.” Protecting the Cellphone User's Right to Hide New York Times Feb Did I set it right? How do I know?

Mar #5 – Inhibiting Established Practices Designs should not inhibit users from transferring established social practices to emerging technologies Rather than getting an immediate ring, an answering machine comes on the line and says, "Lee has been motionless in a dim place with high ambient sound for the last 45 minutes. Continue with call or leave a message." 1. University and Ramona 2. Palo Alto 3. Custom… 9.Ignore for now